Cybersecurity

Inferring Discussion Topics about Exploitation of Vulnerabilities from Underground Hacking Forums

Authors: Felipe Moreno-Vera | Published: 2024-05-07
Cybersecurity
Data Preprocessing
Vulnerability Management

The Malware as a Service ecosystem

Authors: Constantinos Patsakis, David Arroyo, Fran Casino | Published: 2024-05-07
Cybersecurity
Money Laundering Techniques
Malware Classification

SEvenLLM: Benchmarking, Eliciting, and Enhancing Abilities of Large Language Models in Cyber Threat Intelligence

Authors: Hangyuan Ji, Jian Yang, Linzheng Chai, Chaoren Wei, Liqun Yang, Yunlong Duan, Yunli Wang, Tianzhen Sun, Hongcheng Guo, Tongliang Li, Changyu Ren, Zhoujun Li | Published: 2024-05-06 | Updated: 2024-06-03
LLM Performance Evaluation
Cybersecurity
Dataset Generation

Generative AI in Cybersecurity

Authors: Shivani Metta, Isaac Chang, Jack Parker, Michael P. Roman, Arturo F. Ehuan | Published: 2024-05-02
Evolution of AI
Cybersecurity
Prompt Injection

CyberSecEval 2: A Wide-Ranging Cybersecurity Evaluation Suite for Large Language Models

Authors: Manish Bhatt, Sahana Chennabasappa, Yue Li, Cyrus Nikolaidis, Daniel Song, Shengye Wan, Faizan Ahmad, Cornelius Aschermann, Yaohui Chen, Dhaval Kapil, David Molnar, Spencer Whitman, Joshua Saxe | Published: 2024-04-19
LLM Security
Cybersecurity
Prompt Injection

Ransomware Detection and Classification Using Random Forest: A Case Study with the UGRansome2024 Dataset

Authors: Peace Azugo, Hein Venter, Mike Wa Nkongolo | Published: 2024-04-19
Cybersecurity
Dataset Generation
Ransomware Assessment

LLMs for Cyber Security: New Opportunities

Authors: Dinil Mon Divakaran, Sai Teja Peddinti | Published: 2024-04-17
LLM Security
Cybersecurity

Enhancing Network Intrusion Detection Performance using Generative Adversarial Networks

Authors: Xinxing Zhao, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2024-04-11
Watermarking
Cybersecurity
Dataset Generation

Obfuscated Malware Detection: Investigating Real-world Scenarios through Memory Analysis

Authors: S M Rakib Hasan, Aakar Dhakal | Published: 2024-04-03
Cybersecurity
Prompt Injection
Malware Classification

Large language models in 6G security: challenges and opportunities

Authors: Tri Nguyen, Huong Nguyen, Ahmad Ijaz, Saeid Sheikhi, Athanasios V. Vasilakos, Panos Kostakos | Published: 2024-03-18
LLM Security
Cybersecurity
Decentralized LLM Architecture